What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Chunfu Jia
Google Scholar
23
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/istr
A generic cryptographic algorithm identification scheme based on ciphertext features.
Jiabao Li
Hanlin Sun
Zhanfei Du
Yaxuan Wang
Ke Yuan
Chunfu Jia
2025
journals/tifs
PopeDup: Popularity-Based Encrypted Deduplication With Privacy Learning Attacks Resistance and Protected Thresholds.
Xiaowei Ge
Guanxiong Ha
Chunfu Jia
Keyan Chen
Longwei Yang
Qiaowen Jia
2024
conf/sp
A Security Analysis of Honey Vaults.
Fei Duan
Ding Wang
Chunfu Jia
2024
conf/asiaccs
Privacy-Preserving Popularity-Based Deduplication against Malicious Behaviors of the Cloud.
Xiaowei Ge
Guanxiong Ha
Chunfu Jia
Zhen Su
2023
conf/ccs
PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection.
Shijia Li
Jiang Ming
Pengda Qiu
Qiyuan Chen
Lanqing Liu
Huaifeng Bao
Qiang Wang
Chunfu Jia
2023
conf/uss
No Single Silver Bullet: Measuring the Accuracy of Password Strength Meters.
Ding Wang
Xuan Shan
Qiying Dong
Yaosheng Shen
Chunfu Jia
2022
conf/sec
UP-MLE: Efficient and Practical Updatable Block-Level Message-Locked Encryption Scheme Based on Update Properties.
Shaoqiang Wu
Chunfu Jia
Ding Wang
2022
conf/ndss
Chosen-Instruction Attack Against Commercial Code Virtualization Obfuscators.
Shijia Li
Chunfu Jia
Pengda Qiu
Qiyuan Chen
Jiang Ming
Debin Gao
2021
journals/tifs
RLS-PSM: A Robust and Accurate Password Strength Meter Based on Reuse, Leet and Separation.
Qiying Dong
Chunfu Jia
Fei Duan
Ding Wang
2020
journals/compsec
AttriChain: Decentralized traceable anonymous identities in privacy-preserving permissioned blockchain.
Wei Shao
Chunfu Jia
Yunkai Xu
Kefan Qiu
Yan Gao
Yituo He
2020
conf/ccs
PathAFL: Path-Coverage Assisted Fuzzing.
Shengbo Yan
Chenlu Wu
Hang Li
Wei Shao
Chunfu Jia
2019
journals/tifs
Xmark: Dynamic Software Watermarking Using Collatz Conjecture.
Haoyu Ma
Chunfu Jia
Shijia Li
Wantong Zheng
Dinghao Wu
2019
conf/acns
DynOpVm: VM-Based Software Obfuscation with Dynamic Opcode Mapping.
Xiaoyang Cheng
Yan Lin
Debin Gao
Chunfu Jia
2017
conf/icics
An Active and Dynamic Botnet Detection Approach to Track Hidden Concept Drift.
Zhi Wang
Meiqi Tian
Chunfu Jia
2016
journals/tifs
Integrated Software Fingerprinting via Neural-Network-Based Control Flow Obfuscation.
Haoyu Ma
Ruiqi Li
Xiaoxu Yu
Chunfu Jia
Debin Gao
2016
conf/acisp
Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage.
Tong Li
Zheli Liu
Ping Li
Chunfu Jia
Zoe Lin Jiang
Jin Li
2015
conf/ccs
Software Watermarking using Return-Oriented Programming.
Haoyu Ma
Kangjie Lu
Xinjie Ma
Haining Zhang
Chunfu Jia
Debin Gao
2015
conf/icisc
Stack Layout Randomization with Minimal Rewriting of Android Binaries.
Yu Liang
Xinjie Ma
Daoyuan Wu
Xiaoxiao Tang
Debin Gao
Guojun Peng
Chunfu Jia
Huanguo Zhang
2014
conf/acisp
TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage.
Zheli Liu
Jin Li
Xiaofeng Chen
Jun Yang
Chunfu Jia
2013
conf/esorics
Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption.
Jin Li
Xiaofeng Chen
Jingwei Li
Chunfu Jia
Jianfeng Ma
Wenjing Lou
2012
conf/icics
Outsourcing Encryption of Attribute-Based Encryption with MapReduce.
Jingwei Li
Chunfu Jia
Jin Li
Xiaofeng Chen
2011
conf/esorics
Linear Obfuscation to Combat Symbolic Execution.
Zhi Wang
Jiang Ming
Chunfu Jia
Debin Gao
2009
conf/icics
Denial-of-Service Attacks on Host-Based Generic Unpackers.
Limin Liu
Jiang Ming
Zhi Wang
Debin Gao
Chunfu Jia
Coauthors
Chenlu Wu
(1)
Chunfu Jia
(23)
Daoyuan Wu
(1)
Debin Gao
(7)
Ding Wang
(4)
Dinghao Wu
(1)
Fei Duan
(2)
Guanxiong Ha
(2)
Guojun Peng
(1)
Haining Zhang
(1)
Hang Li
(1)
Hanlin Sun
(1)
Haoyu Ma
(3)
Huaifeng Bao
(1)
Huanguo Zhang
(1)
Jiabao Li
(1)
Jianfeng Ma
(1)
Jiang Ming
(4)
Jin Li
(4)
Jingwei Li
(2)
Jun Yang
(1)
Kangjie Lu
(1)
Ke Yuan
(1)
Kefan Qiu
(1)
Keyan Chen
(1)
Lanqing Liu
(1)
Limin Liu
(1)
Longwei Yang
(1)
Meiqi Tian
(1)
Pengda Qiu
(2)
Ping Li
(1)
Qiang Wang
(1)
Qiaowen Jia
(1)
Qiying Dong
(2)
Qiyuan Chen
(2)
Ruiqi Li
(1)
Shaoqiang Wu
(1)
Shengbo Yan
(1)
Shijia Li
(3)
Tong Li
(1)
Wantong Zheng
(1)
Wei Shao
(2)
Wenjing Lou
(1)
Xiaofeng Chen
(3)
Xiaowei Ge
(2)
Xiaoxiao Tang
(1)
Xiaoxu Yu
(1)
Xiaoyang Cheng
(1)
Xinjie Ma
(2)
Xuan Shan
(1)
Yan Gao
(1)
Yan Lin
(1)
Yaosheng Shen
(1)
Yaxuan Wang
(1)
Yituo He
(1)
Yu Liang
(1)
Yunkai Xu
(1)
Zhanfei Du
(1)
Zheli Liu
(2)
Zhen Su
(1)
Zhi Wang
(3)
Zoe Lin Jiang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to